Open source code for commercial software applications is ubiquitous, but so is the risk

As the SolarWinds and Log4j hacks show, vulnerabilities in open source software used in application development can open doors for attackers with vast consequences. A new study looks at... Read more »

Demo Video – Continuous Data Protection (German)

Eliminate outages and minimize data loss for Tier 1 VMware workloads with built-in Continuous Data Protection (CDP) and get instant restores to the most recent state or point in... Read more »

How to use folders in Bitwarden to manage passwords for project teams

If your project team members need to share passwords, learn how to use Bitwarden’s Folders feature. The post How to use folders in Bitwarden to manage passwords for project... Read more »

Cybersecurity adoption hampered by shortage of skills and poor product integration

A limited security budget was also a top obstacle for CISOs and IT decision makers, according to a recent survey from BlackFog. The post Cybersecurity adoption hampered by shortage... Read more »

Apple unveils new iMessage, Apple ID and iCloud security for high-value targets

Tech firm aims to strengthen security for users and meet modern cyber threat challenges with new cybersecurity technology and end-to-end cloud encryption. The post Apple unveils new iMessage, Apple... Read more »

McAfee 2023 Threat Predictions

2022 is almost over, and the threats seen during the year have built the foundations for 2023’s threat landscape, according to McAfee. Cyber criminals will benefit from new technologies... Read more »

Protect your most valuable data forever for only $70 — don’t miss this deal

Train for cybersecurity certifications as you need them to advance through an entire career. The post Protect your most valuable data forever for only $70 — don’t miss this... Read more »

Healthcare systems face a “royal” cybersecurity threat from new hacker group

A new alert from the HHS warns of the Royal ransomware threat actor’s aim on the healthcare sector. The post Healthcare systems face a “royal” cybersecurity threat from new... Read more »

Recognize the commonalities in ransomware attacks to avoid them

Learn how your organization can use the MITRE ATT&CK framework to prevent data breaches, fines, and the loss of clients and customers induced by ransomware threats. The post Recognize... Read more »

TrueBot malware delivery evolves, now infects businesses in the US and elsewhere

New research from Cisco Talos reveals that the infamous TrueBot malware has updated its modus operandi and now hits the U.S. with additional payloads such as the infamous Clop... Read more »
Subscribe to our Newsletter